Systems Exploitation: Sniffing, Man in the Middle, etc.

View the slides.

This week, we talked about system exploitation including sniffing, man-in-the-middle attacks, and more.